General
-
Target
8493d8720bb672a05a7a7058bc2450b242c1325f8e689dd75e80024294aa0bb3N.exe
-
Size
120KB
-
Sample
241216-d1pdnstlaj
-
MD5
b01eb07fd3ef3b5152b7d6e28f722b50
-
SHA1
5f3a6d9f95f60de033da491d496fe2d51d9bd483
-
SHA256
8493d8720bb672a05a7a7058bc2450b242c1325f8e689dd75e80024294aa0bb3
-
SHA512
14105809fd2bd555297d16c2a036521cd3402023d692da3a2fdc4ea1bca33f73816b22baecc9cc44dc6c4d0e8672c6fb2aac7152ee19a3d76739e1da09d617b4
-
SSDEEP
3072:4S9rqLo4Jt/ktSZH9PSaQQh28EQif4W3FyLrUGkB9:4S5L4JBktSbSab27Q47FUQ
Static task
static1
Behavioral task
behavioral1
Sample
8493d8720bb672a05a7a7058bc2450b242c1325f8e689dd75e80024294aa0bb3N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8493d8720bb672a05a7a7058bc2450b242c1325f8e689dd75e80024294aa0bb3N.exe
-
Size
120KB
-
MD5
b01eb07fd3ef3b5152b7d6e28f722b50
-
SHA1
5f3a6d9f95f60de033da491d496fe2d51d9bd483
-
SHA256
8493d8720bb672a05a7a7058bc2450b242c1325f8e689dd75e80024294aa0bb3
-
SHA512
14105809fd2bd555297d16c2a036521cd3402023d692da3a2fdc4ea1bca33f73816b22baecc9cc44dc6c4d0e8672c6fb2aac7152ee19a3d76739e1da09d617b4
-
SSDEEP
3072:4S9rqLo4Jt/ktSZH9PSaQQh28EQif4W3FyLrUGkB9:4S5L4JBktSbSab27Q47FUQ
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5